Francesco Raviglione, M. Malinverno, Stefano Feraco, G. Avino, C. Casetti, C. Chiasserini, N. Amati, Joerg Widmer
Connected and automated vehicles are becoming a reality, and the necessity of assessing the performance of their technical enablers plays a pivotal role in the automotive field. Several technologies have been proposed by different standardization bodies, with the aim of enabling the connectivity between vehicles, and between vehicles and the infrastructure. Before the deployment of any technology, it is fundamental to perform a testing and validation phase, which is often performed in simulation environments. However, in order to assess the actual performance of a V2X (Vehicle-to-Everything) communication technology, field tests are of utmost importance. In this paper, we present the results of an extensive field test campaign of non-mmWave and mmWave IEEE 802.11 technologies for V2I (Vehicle-to-Infrastructure) communications, namely, IEEE 802.11p, IEEE 802.11ac, and IEEE 802.11ad. We assess the performance of each of them, in terms of connection stability, received signal level, Round Trip Time and UDP throughput, in both Line-Of-Sight and Non-Line-Of-Sight conditions. Our results show that, although not specifically designed for vehicular communications, IEEE 802.11ac and IEEE 802.11ad emerge as very promising technologies.
{"title":"Experimental Assessment of IEEE 802.11-based V2I Communications","authors":"Francesco Raviglione, M. Malinverno, Stefano Feraco, G. Avino, C. Casetti, C. Chiasserini, N. Amati, Joerg Widmer","doi":"10.1145/3479240.3488506","DOIUrl":"https://doi.org/10.1145/3479240.3488506","url":null,"abstract":"Connected and automated vehicles are becoming a reality, and the necessity of assessing the performance of their technical enablers plays a pivotal role in the automotive field. Several technologies have been proposed by different standardization bodies, with the aim of enabling the connectivity between vehicles, and between vehicles and the infrastructure. Before the deployment of any technology, it is fundamental to perform a testing and validation phase, which is often performed in simulation environments. However, in order to assess the actual performance of a V2X (Vehicle-to-Everything) communication technology, field tests are of utmost importance. In this paper, we present the results of an extensive field test campaign of non-mmWave and mmWave IEEE 802.11 technologies for V2I (Vehicle-to-Infrastructure) communications, namely, IEEE 802.11p, IEEE 802.11ac, and IEEE 802.11ad. We assess the performance of each of them, in terms of connection stability, received signal level, Round Trip Time and UDP throughput, in both Line-Of-Sight and Non-Line-Of-Sight conditions. Our results show that, although not specifically designed for vehicular communications, IEEE 802.11ac and IEEE 802.11ad emerge as very promising technologies.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"71 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81840804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reducing the fuel consumption and gas emissions of traveling vehicles over the road networks have been intensively investigated over the road networks. Vehicles produce a high percentage of pollution to the atmosphere that encourages governments and organizations to invest and work toward reducing their emissions. The behavior of the same vehicle varies over downtown and highway scenarios in terms of efficiency and pollution parameters. This is due to the effects of the architectural design of the traversed road and the driving behavior. In this work, we propose an efficient traffic light scheduling algorithm. It considers the real-time traffic characteristics of the competing traffic flows at a signalized road intersection. This is to produce an efficient schedule that minimizes the total required fuel of vehicles and produces less emissions while passing safely through that intersection. An extensive set of experiments have been used to verify the performance of the proposed scheduling algorithm compared to other efficient traffic light scheduling algorithms.
{"title":"Green Road Intersections by Efficient Traffic Light Scheduling Algorithm","authors":"Maram Bani Younes, A. Boukerche","doi":"10.1145/3479240.3488508","DOIUrl":"https://doi.org/10.1145/3479240.3488508","url":null,"abstract":"Reducing the fuel consumption and gas emissions of traveling vehicles over the road networks have been intensively investigated over the road networks. Vehicles produce a high percentage of pollution to the atmosphere that encourages governments and organizations to invest and work toward reducing their emissions. The behavior of the same vehicle varies over downtown and highway scenarios in terms of efficiency and pollution parameters. This is due to the effects of the architectural design of the traversed road and the driving behavior. In this work, we propose an efficient traffic light scheduling algorithm. It considers the real-time traffic characteristics of the competing traffic flows at a signalized road intersection. This is to produce an efficient schedule that minimizes the total required fuel of vehicles and produces less emissions while passing safely through that intersection. An extensive set of experiments have been used to verify the performance of the proposed scheduling algorithm compared to other efficient traffic light scheduling algorithms.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82336804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Esther Guérin, Thomas Begin, A. Busson, I. G. Lassous
In very dense or ultra-dense scenarios wherein Wi-Fi alone may not be enough to accommodate the needs of all stations, LiFi (Light Fidelity) access points can help alleviate the strain on the Wi-Fi by offloading some Wi-Fi traffic to LiFi. We study the issue of associating stations in a Wi-Fi/LiFi heterogeneous network composed of a Wi-Fi access point and multiples LiFi access points. We propose a conceptually simple and easy to implement solution to search and find an efficient mapping for the associations between stations and access points using analytical performance models for the individual throughput of each station and for the overall network energy consumption. Using two realistic deployments of heterogeneous networks for offices, we have evaluated the effectiveness of our solution at discovering better trade-offs than baseline strategies. Our numerical results show that significant gains can be obtained in terms of the throughput of the stations as well as overall energy consumption.
{"title":"Towards a Throughput and Energy Efficient Association Strategy for Wi-Fi/LiFi Heterogeneous Networks","authors":"Esther Guérin, Thomas Begin, A. Busson, I. G. Lassous","doi":"10.1145/3479240.3488514","DOIUrl":"https://doi.org/10.1145/3479240.3488514","url":null,"abstract":"In very dense or ultra-dense scenarios wherein Wi-Fi alone may not be enough to accommodate the needs of all stations, LiFi (Light Fidelity) access points can help alleviate the strain on the Wi-Fi by offloading some Wi-Fi traffic to LiFi. We study the issue of associating stations in a Wi-Fi/LiFi heterogeneous network composed of a Wi-Fi access point and multiples LiFi access points. We propose a conceptually simple and easy to implement solution to search and find an efficient mapping for the associations between stations and access points using analytical performance models for the individual throughput of each station and for the overall network energy consumption. Using two realistic deployments of heterogeneous networks for offices, we have evaluated the effectiveness of our solution at discovering better trade-offs than baseline strategies. Our numerical results show that significant gains can be obtained in terms of the throughput of the stations as well as overall energy consumption.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"8 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91349970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. C. Domingues, Ekler Paulino de Mattos, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro
In many different contexts, the encounter between two or more individuals opens a window in which information can be exchanged. Considering Mobile Ad hoc Networks (MANETs) scenarios, encounters - also called contacts - are used to transfer data between nodes (the users). In more recent cases, tracing contacts between individuals has shown to be a strong strategy in mapping the transmission of contagious diseases, such as COVID-19. However, sharing contact data can impose threats to the safety of participants regarding their social and mobility behavior. As an example, we can infer acquaintances, as well as home and work locations. This work presents a strategy to anonymize contact tracing data by utilizing mix-zones, a well-defined concept to anonymize data in a given region. Called social mix-zones, it considers the number of contacts happening in a location, producing anonymized data and protecting the personal integrity of the individuals. We validate the proposal using two real contact tracing data, showing that social mix-zones can cover a large portion of contacts, reducing the risk of malicious location attacks.
{"title":"Social Mix-zones: Anonymizing Personal Information on Contact Tracing Data","authors":"A. C. Domingues, Ekler Paulino de Mattos, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro","doi":"10.1145/3479240.3488533","DOIUrl":"https://doi.org/10.1145/3479240.3488533","url":null,"abstract":"In many different contexts, the encounter between two or more individuals opens a window in which information can be exchanged. Considering Mobile Ad hoc Networks (MANETs) scenarios, encounters - also called contacts - are used to transfer data between nodes (the users). In more recent cases, tracing contacts between individuals has shown to be a strong strategy in mapping the transmission of contagious diseases, such as COVID-19. However, sharing contact data can impose threats to the safety of participants regarding their social and mobility behavior. As an example, we can infer acquaintances, as well as home and work locations. This work presents a strategy to anonymize contact tracing data by utilizing mix-zones, a well-defined concept to anonymize data in a given region. Called social mix-zones, it considers the number of contacts happening in a location, producing anonymized data and protecting the personal integrity of the individuals. We validate the proposal using two real contact tracing data, showing that social mix-zones can cover a large portion of contacts, reducing the risk of malicious location attacks.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"141 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77301414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Perumalraja Rengaraju, K. Sethuramalingam, Chung-Horng Lung
Natural disasters such as earthquake, tsunami, land sliding, wildfires, flood and hurricane have frequently happened in many places around the world. Once disaster occurred, communication networks and information systems may be damaged, depending on the level of destruction. When communication networks are seriously affected, residents in the disaster area cannot communicate their situations and needs. In recent years, social networks play a vital role in connecting people and providing support with woe for survivors and their family during natural catastrophes around the world. Therefore, it is necessary to provide Internet services to the affected area at the earliest, so that victims can use the emergency communication network to confirm their safety. From the literature study, it was observed that the balloon networks satisfy the needs of post disaster communications. In this paper, a prototype system for a balloon network is constructed using two wireless nodes in the sky for establishing emergency communications. The Internet service is provided for the network using WiFi and tested for disaster communications, e.g., accessing social network sites and VoIP calls. Finally, we evaluate the performance of the disaster communications to analyze the suitability of balloon networks during post disaster communications. From the results it is observed that a WiFi balloon network can be deployed easily to provide Internet services to the affected area to meet users' needs.
{"title":"Providing Internet Access for Post-Disaster Communications using Balloon Networks","authors":"Perumalraja Rengaraju, K. Sethuramalingam, Chung-Horng Lung","doi":"10.1145/3479240.3488497","DOIUrl":"https://doi.org/10.1145/3479240.3488497","url":null,"abstract":"Natural disasters such as earthquake, tsunami, land sliding, wildfires, flood and hurricane have frequently happened in many places around the world. Once disaster occurred, communication networks and information systems may be damaged, depending on the level of destruction. When communication networks are seriously affected, residents in the disaster area cannot communicate their situations and needs. In recent years, social networks play a vital role in connecting people and providing support with woe for survivors and their family during natural catastrophes around the world. Therefore, it is necessary to provide Internet services to the affected area at the earliest, so that victims can use the emergency communication network to confirm their safety. From the literature study, it was observed that the balloon networks satisfy the needs of post disaster communications. In this paper, a prototype system for a balloon network is constructed using two wireless nodes in the sky for establishing emergency communications. The Internet service is provided for the network using WiFi and tested for disaster communications, e.g., accessing social network sites and VoIP calls. Finally, we evaluate the performance of the disaster communications to analyze the suitability of balloon networks during post disaster communications. From the results it is observed that a WiFi balloon network can be deployed easily to provide Internet services to the affected area to meet users' needs.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85244192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Within environment generated when deploying Internet of Things (IoT) solutions, there is a need to do it securely. Authentication of the devices against the applications deployed on the servers, which receive or send data to the IoT devices must be carried out. Standard IoT protocols, such as CoAP or MQTT, define secure communica- tions through protocols on transport, network or application layers. Nevertheless, a shortcoming when protocols using secret keys are used lies in the management of such keys, which is out of scope of the specifications. For this reason, this article presents an authenti- cation solution for OSCORE (Object Security for Constrained RESTful Environments) based on PUFs (Physical Unclonable Functions) that makes it possible to establish a secure mechanism for the exchange and management of keys. The performance of this proposal has been evaluated, showing its viability.
{"title":"A PUF-based Authentication Mechanism for OSCORE","authors":"J. Díaz, Florina Almenáres","doi":"10.1145/3479240.3488526","DOIUrl":"https://doi.org/10.1145/3479240.3488526","url":null,"abstract":"Within environment generated when deploying Internet of Things (IoT) solutions, there is a need to do it securely. Authentication of the devices against the applications deployed on the servers, which receive or send data to the IoT devices must be carried out. Standard IoT protocols, such as CoAP or MQTT, define secure communica- tions through protocols on transport, network or application layers. Nevertheless, a shortcoming when protocols using secret keys are used lies in the management of such keys, which is out of scope of the specifications. For this reason, this article presents an authenti- cation solution for OSCORE (Object Security for Constrained RESTful Environments) based on PUFs (Physical Unclonable Functions) that makes it possible to establish a secure mechanism for the exchange and management of keys. The performance of this proposal has been evaluated, showing its viability.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"12 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79613206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Session 4: Enhancement of Wireless Ad hoc Networks","authors":"I. Guérin Lassous","doi":"10.1145/3501373","DOIUrl":"https://doi.org/10.1145/3501373","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"163 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77647930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Javier Reinoso Chisaguano, J. León, M. C. Paredes, Pablo Anibal Lupera Morillo, L. Urquiza-Aguiar
NS-3 is a network simulator used for the research and development of Vehicular Ad-hoc Networks (VANETs). It allows the IEEE 802.11p standard simulation, which is part of IEEE Wireless Access in the Vehicular Environment (WAVE). One of the limitations of the 802.11p standard in NS-3 is using a simplified theoretical model of the Packet Error Rate (PER). This standard uses for the Physical Layer (PHY) the Orthogonal Frequency Division Multiplexing (OFDM) technique, which suffers from high Peak to Average Power Ratio (PAPR). This high PAPR of the signal causes degradation of the PER when it passes through a non-linear amplifier. In this work, we study the effect of the high PAPR over the PER using a MATLAB implementation of the 802.11p PHY. We also analyze the effect of using the Orthogonal Pilot Sequences (OPS) technique for PAPR reduction. The results show that the high PAPR affects the PER of high data rates, which use 16-QAM and 64-QAM modulation. Finally, these results are extended to NS-3 simulations as a new model of the IEEE 802.11p PHY with high realism since it considers the effect of the non-linear HPA. The NS-3 results show a similar trend compared to the MATLAB simulations.
{"title":"Improving the Realism of the Physical Layer of NS-3 by Considering the PAPR Problem of the IEEE 802.11p Transmitter","authors":"Diego Javier Reinoso Chisaguano, J. León, M. C. Paredes, Pablo Anibal Lupera Morillo, L. Urquiza-Aguiar","doi":"10.1145/3479240.3488509","DOIUrl":"https://doi.org/10.1145/3479240.3488509","url":null,"abstract":"NS-3 is a network simulator used for the research and development of Vehicular Ad-hoc Networks (VANETs). It allows the IEEE 802.11p standard simulation, which is part of IEEE Wireless Access in the Vehicular Environment (WAVE). One of the limitations of the 802.11p standard in NS-3 is using a simplified theoretical model of the Packet Error Rate (PER). This standard uses for the Physical Layer (PHY) the Orthogonal Frequency Division Multiplexing (OFDM) technique, which suffers from high Peak to Average Power Ratio (PAPR). This high PAPR of the signal causes degradation of the PER when it passes through a non-linear amplifier. In this work, we study the effect of the high PAPR over the PER using a MATLAB implementation of the 802.11p PHY. We also analyze the effect of using the Orthogonal Pilot Sequences (OPS) technique for PAPR reduction. The results show that the high PAPR affects the PER of high data rates, which use 16-QAM and 64-QAM modulation. Finally, these results are extended to NS-3 simulations as a new model of the IEEE 802.11p PHY with high realism since it considers the effect of the non-linear HPA. The NS-3 results show a similar trend compared to the MATLAB simulations.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"16 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77930242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mauro Clavijo-Herrera, J. Banda-Almeida, Cristhian Iza
Vehicular Ad Hoc Network (VANET) provides communication between vehicles and roadside infrastructures to improve safety, traffic efficiency, and comfort. VANET requires the implementation of precise security mechanisms to guarantee safety because attackers are always searching for methods to exploit network vulnerabilities. A common and harmful threat is the Denial of Service (DoS) attack. DOS is performed by malicious nodes to block vehicle communications and to interrupt network availability. In this work, we evaluate three different misbehavior detection mechanisms: threshold, behavioral, and cooperative. These methods are compared using the F2MD simulation environment with four DoS attacks: Normal, Random, Sybil, and DDoS. The performance of the misbehavior detection mechanisms is evaluated by accuracy, recall, and precision. Our comparative results demonstrate that the threshold-based method outperforms the other two in the proposed simulation scenario.
{"title":"Performance Evaluation in Misbehaviour Detection Techniques for DoS Attacks in VANETs","authors":"Mauro Clavijo-Herrera, J. Banda-Almeida, Cristhian Iza","doi":"10.1145/3479240.3488510","DOIUrl":"https://doi.org/10.1145/3479240.3488510","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) provides communication between vehicles and roadside infrastructures to improve safety, traffic efficiency, and comfort. VANET requires the implementation of precise security mechanisms to guarantee safety because attackers are always searching for methods to exploit network vulnerabilities. A common and harmful threat is the Denial of Service (DoS) attack. DOS is performed by malicious nodes to block vehicle communications and to interrupt network availability. In this work, we evaluate three different misbehavior detection mechanisms: threshold, behavioral, and cooperative. These methods are compared using the F2MD simulation environment with four DoS attacks: Normal, Random, Sybil, and DDoS. The performance of the misbehavior detection mechanisms is evaluated by accuracy, recall, and precision. Our comparative results demonstrate that the threshold-based method outperforms the other two in the proposed simulation scenario.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"38 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85611121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}